Uploaded by makkiyoussef3

Guide to Risk Assessment and Treatment

advertisement
Risk Management
Understanding risks
Internal Risks: Arise from within the organization.
External Risks: Arise from outside the organization.
Multiparty Risks: Affect more than one organization.
Intellectual property therft : poses a risk to knowleage-based organizations.
Software license compliance: issues risk fines and legal action.
Risk assessment
Risk assessment identifies and triages risks.
Threats: are external forces that jeopardize security.
Vulnerabilities: are weaknesses in your security controls.
Risks : are the combination of a threat and a vulnerability.
Risks rank by Likelihood and Impact.
Likelihood: is the probability a risk will occur.
Impact: is the amount of damamge a risk will cause.
we have two different categories of technique that we can use to assess the likelihood and Impact of
a risk.
1. Qualitative Risk Assessment: Uses subjective ratings to evaluate risk likelihood and impact.
![[Qualitative Risk assessment.png]]
2. Quantitative Risk Assessment: Uses Objective numeric ratings to evaluate risk likelihood and
impact.
Risk treatment
Risk treatment analyzes and implements possible responses to control risk.
Risk Treatment Options
1. Risk avoidance
Risk avoidance changes business practices to make a risk irrelevant.
2. Risk transference
Risk treatment analyzes and implements possible responses to control risk.
3. Risk mitigation
Risk mitigation reduces the likelihood or impact of a risk.
4. Risk acceptance
Risk acceptance is the choice to continue operations in the face of a risk.
Selecting security controls
Security controls reduce the likelihood or impact of a risk and help identify issues.
Two different ways of security controls
1. Control Purpose
i. Preventive
Preventive controls stop a security issue from occcurring.
ii. Detective
Detective controls identify security issues requiring investigation.
iii. Corrective
Recovery controls remediate security issues that have occurred.
2. Control Mechanism
i. Technical
use technology to achieve control objectives.
ii. Administrative
use processes to achieve control objectives.
iii. Physical
Impact the physical world.
Configuration managment
Tracks specific device settings
Baselines: Provide a configuration snapshot.
Versioning: Assigns numbers to each varsion.
Diagrams serve as important configuration artifacts.
Standardize Device Configurations
Naming conventions
IP adderessing schemes
Change and management help ensure a stable operating environment.
Download